All of lore.kernel.org
 help / color / mirror / Atom feed
From: Lars Kurth <lars.kurth.xen@gmail.com>
To: Matt Wilson <msw@linux.com>
Cc: xen-devel@lists.xenproject.org,
	Ian Campbell <Ian.Campbell@citrix.com>,
	Ian Jackson <ijackson@chiark.greenend.org.uk>
Subject: Re: Security policy ambiguities - XSA-108 process post-mortem
Date: Wed, 22 Oct 2014 14:05:38 +0100	[thread overview]
Message-ID: <85CD9DFC-0DC1-4E70-ABDB-FE127C9F09DC@gmail.com> (raw)
In-Reply-To: <20141022003517.GA784@u109add4315675089e695.ant.amazon.com>


On 22 Oct 2014, at 01:41, Matt Wilson <msw@linux.com> wrote:

> On Tue, Oct 21, 2014 at 07:20:28PM +0100, Lars Kurth wrote:
>> 
>> 
>> I don’t have an issue with such an approach, in particular as this
>> is a proven model elsewhere. I would like to understand though how
>> the oss-security process works in practice. Aka how are decisions
>> made, who can join the list, how are conflicts resolved, etc. It
>> seems to me that such a process would be more transparent and also
>> fair. In particular, if we have clear criteria as to what needs to
>> be in place to be eligible.
> 
> Indeed, the criteria for the distros and linux-distros lists are less
> completely spelled out compared to the current Xen pre-disclosure
> criteria. You have to look through the discussions on oss-security to
> see how requests are evaluated. Typically there is a bias toward not
> adding new people to the list unless there is a clear justification
> through debate. It's much less of a "if you can tick all these boxes"
> process and more of a discussion.

The changes on the table are really more practical and aim at demonstrating a) use of Xen and b) a mature security vulnerability process. So I don't think there is a contradiction with having criteria.

> 
> Consider this similar to "how do I get my patch applied to the
> hypervisor?" You propose a patch, it is debated, and if it is good for
> the project it will be applied. It may not be good for the project, in
> which case it will not be applied. Some people may say this is unfair,
> and that individuals or organizations that get their patches applied
> have an advantage over others.
> 
> What is the conflict resolution path for "my patch isn't being applied
> to upstream Xen"? :-)

Maintainer(s) > committer(s) > project lead (> advisory board in some extremely rare circumstances) - in practice however, 99.99% of all issues get resolved at maintainers & committers stage without a vote. I cannot recall an issue where the project lead had to step in as long as I worked with the project and we never had the AB engaged.

To make this work within the existing governance, we would need the equivalent of maintainer(s) > committer(s) > project lead for the pre-disclosure list. We don't have to have a full hierarchy: a project lead makes no sense in this case, or the project lead would just be the Xen HV project lead. If we compare with oss-sec the equivalent of the committer is Alexander. 

So I guess what I am saying is that this is doable, without governance changes.

> 
>> It seems to me that if we do this, we may need to look at the
>> Project Governance as well, as having a stake in decision making
>> requires maintainer status today. The existing decision making
>> process could easily be used to discuss access related to
>> Coverity. It is not entirely clear to me whether maintainers should
>> have to carry the burden of making decisions on who can join the
>> pre-disclosure list.
> 
> I believe that strong projects have strong owners. I worry about
> projects that fall quickly to making decisions by committee. The "two
> +1 with no -1" model that you proposed for Coverity in [1] seems to be
> a reasonable balance.

I stated before that we hardly ever use the voting model for day-to-day activities. Only for process changes, new projects and committer/project lead elections. Personally, I believe that avoiding a formal vote in this case is preferable. 

So the question then would be who would be the owner (aka maintainer and/or committer) of the security pre-disclosure list. The only natural candidates we have right now are members of the Security Team. Of course this may evolve over time, in particular if people who have already a standing in the wider FOSS security community get actively engaged with the process. 

So assuming that someone from the Security Team is willing to step up, and the community agrees, this could be done. But in practice, the burden would still fall onto members of Security Team and all we would change is to create more transparency - at least in the short term. Please do correct me, if you think I am wrong.

>> Also, we would need to ensure that requests are not dropped and that
>> the required admin works (adding entities who qualify to the
>> pre-disclosure list as well as adding them to the website).
> 
> I think this is the same as getting a patch applied. Patches get
> dropped. People proposing patches send pings. Maintainers get
> busy. This is a part of life in working with open source projects. I
> think it's best to avoid strict request SLAs, just as we don't have a
> "your patch will be applied in 7 days" SLA.

That is OK. A bit of a filter on the seriousness of someone requesting to be on the list.

Regards
Lars

  reply	other threads:[~2014-10-22 13:05 UTC|newest]

Thread overview: 52+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-10-21 18:20 Security policy ambiguities - XSA-108 process post-mortem Lars Kurth
2014-10-22  0:41 ` Matt Wilson
2014-10-22 13:05   ` Lars Kurth [this message]
2014-10-22 15:53     ` Matt Wilson
2014-11-10 17:44       ` Ian Jackson
  -- strict thread matches above, loose matches on Subject: below --
2014-10-08 15:54 Xen Project Security Team
2014-10-08 23:06 ` Ian Jackson
2014-10-08 23:55   ` Lars Kurth
2014-10-09  9:37     ` Ian Jackson
2014-10-09 11:24       ` George Dunlap
2014-10-09 16:19         ` Ian Campbell
2014-10-10 14:25         ` Jan Beulich
2014-10-13 12:17           ` George Dunlap
2014-10-29 13:27             ` James Bulpin
2015-01-19 20:36               ` James McKenzie
2015-01-20  8:54                 ` Jan Beulich
2015-01-20 12:29                 ` George Dunlap
2015-02-12 10:44                 ` Lars Kurth
2014-11-10 18:01     ` Ian Jackson
2014-11-11 12:39       ` John Haxby
2014-11-12 18:09       ` George Dunlap
2014-11-13 17:36         ` Ian Jackson
2014-11-14 12:10       ` Lars Kurth
2014-11-14 12:50         ` Ian Jackson
2014-11-14 17:37           ` Lars Kurth
2015-01-16 19:23         ` Ian Jackson
2014-10-09 11:09   ` George Dunlap
2014-10-10 14:47   ` Jan Beulich
2014-10-13 11:23     ` George Dunlap
2014-10-13 12:16     ` Lars Kurth
2014-11-10 17:25       ` Ian Jackson
2014-10-29 13:27     ` James Bulpin
2014-11-10 17:21     ` Ian Jackson
2014-10-21 12:32   ` Ian Campbell
2014-10-21 14:31     ` Matt Wilson
2014-10-21 15:06       ` Jan Beulich
2014-11-10 17:29       ` Ian Jackson
2014-11-10 17:39         ` George Dunlap
2014-11-10 18:04           ` Ian Jackson
2014-10-30 11:58     ` Ian Jackson
2014-10-31 22:40       ` Matt Wilson
2014-11-03 11:37         ` George Dunlap
2014-11-03 17:23           ` Matt Wilson
2014-11-05 11:17         ` Ian Campbell
2014-11-06 16:01           ` Lars Kurth
2014-11-10 12:35             ` Ian Campbell
2014-10-22 23:23   ` Bastian Blank
2014-10-29 13:27     ` James Bulpin
2014-11-10 17:42     ` Ian Jackson
2014-10-09  8:29 ` Ian Campbell
2014-10-29 13:27 ` James Bulpin
2014-10-30 10:51   ` Tim Deegan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=85CD9DFC-0DC1-4E70-ABDB-FE127C9F09DC@gmail.com \
    --to=lars.kurth.xen@gmail.com \
    --cc=Ian.Campbell@citrix.com \
    --cc=ijackson@chiark.greenend.org.uk \
    --cc=msw@linux.com \
    --cc=xen-devel@lists.xenproject.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.